Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
k-anonymity
biblio
Algorithm for k-anonymity based on ball-tree and projection area density partition
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
Loss measurement
usability
UCI
trees (mathematics)
tree data structures
Resiliency
resilience
pubcrawl
projection area density partition
privacy
Partitioning algorithms
microdata publishing
Metrics
Adult dataset
kd-tree
k-anonymity algorithm
k-anonymity
information science
individual privacy protection
Human behavior
Gotrack dataset
data privacy
composability
Classification algorithms
ball-tree
anonymity
biblio
Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT
Submitted by grigby1 on Thu, 08/13/2020 - 5:33pm
maximum entropy methods
probability
anonymity
Trajectory
k-anonymity
cloud computing technology
k-anonymity-based dummy generation algorithms
location based services
location-based services
maximum entropy
Metrics
offline trajectory data protection
offline trajectory protection
online trajectory protection
real-time trajectory privacy protection
time-dependent query probability
trajectory protection
trajectory protection scheme
trajectory publication
transition probability
Cloud Computing
security of data
Servers
IoT
pubcrawl
Human behavior
resilience
Resiliency
security
privacy
Internet of Things
Computational modeling
Entropy
composability
mobile computing
edge computing
Fog computing
Data protection
Security analysis
biblio
Trajectory Anonymity Based on Quadratic Anonymity
Submitted by grigby1 on Thu, 08/13/2020 - 5:33pm
adjacent anonymous area
trajectory anonymous algorithm
trajectory anonymity publishing
synchronous trajectory data
Synchronous trajectory
Sensitive region
quadratic anonymity
privacy information
original Regional anonymity
original location
Location mappings
location mapping
Location area division
K-anonymous
forged location
current sensitive region
Servers
k-anonymity
Trajectory
anonymity
Euclidean distance
Metrics
Perturbation methods
Data protection
computer science
composability
data privacy
privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
Test-Driven Anonymization for Artificial Intelligence
Submitted by grigby1 on Thu, 08/13/2020 - 5:07pm
anonymization efforts
artificial intelligence security
test-driven anonymization approach
Software Testing
regulatory requirements
Privacy Protections
nonfunctional quality
k-anonymity
internal requirements
Insurance
functional suitability
functional quality
classification AIs
artificial intelligence tools
anonymized data
anonymization techniques
tools
anonymization
AI context
artificial intelligence technique
testing
Data protection
pattern classification
Production
health care
data privacy
Data models
pubcrawl
Artificial Intelligence
Predictive models
security of data
biblio
A Scalable (\$\textbackslashtextbackslashalpha, k\$)-Anonymization Approach using MapReduce for Privacy Preserving Big Data Publishing
Submitted by grigby1 on Fri, 08/07/2020 - 3:47pm
big data privacy
Velocity of data
timely anonymization
scenarios efficient anonymization
Scalable k-Anonymization approach
Scalable k-Anonymization (SKA)
scalable anonymization approach
Publishing
privacy preserving big data publishing
privacy preserving approaches scalability
MapReduce based Anonymization (MRA)
k-anonymity
data publishing approaches
Credit cards
security of data
anonymity
AI
Government
Scalability
Big Data
privacy issues
privacy
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Privacy Preserving Big Data Publication On Cloud Using Mondrian Anonymization Techniques and Deep Neural Networks
Submitted by aekwall on Mon, 07/13/2020 - 11:07am
privacy
k-anonymity
machine learning
Mondrian anonymization techniques
Mondrian based k-anonymity approach
neural nets
Neural networks
personal data
personally identifiable information
predominant factor
high-dimensional data deep neural network based framework
privacy breach
privacy preservation
privacy preserving big data publication
privacy-preservation
protection
Resiliency
security
user privacy in the cloud
data analysis
pubcrawl
Human Factors
resilience
Scalability
Metrics
Big Data
Big Data Analytics
Cloud Computing
compromising privacy
big data privacy
data management
Data models
data privacy
data utility
Databases
deep neural networks
differential privacy
DNN
biblio
Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets
Submitted by grigby1 on Thu, 07/09/2020 - 1:57pm
Predictive models
testing
Sociology
sensitive information
sensitive attribute
Scalability
sanitized data
sanitization techniques
sanitization
Resiliency
resilience
pubcrawl
privacy models
privacy
Compositionality
personal information
machine learning
l-Diversity
k-anonymity
Inferences
inference mechanisms
Human Factors
Human behavior
differential privacy
differential inference testing
Data Sanitization
data privacy
data deletion
biblio
An Improved Privacy Protection Method Based on k-degree Anonymity in Social Network
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
Metrics
structural modifications
social networking (online)
social network
Publishing
pubcrawl
privacy protection
privacy models and measurement
privacy
pattern clustering
original social network
node degrees
network theory (graphs)
network structure stable
network nodes
anonymity
Mathematical model
Loss measurement
k-subgraph method
k-degree anonymous graph
k-degree anonymity
k-anonymity
information losses
information loss
improved privacy protection method
graph theory
data privacy
computer security
Clustering algorithms
anonymity models
biblio
An Efficient Location Privacy Preserving Model based on Geohash
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
Geohash geographic information
privacy models and measurement
user privacy security
Privacy protection model
Location-based service
location-aware mobile devices
LBS privacy protection model
k-anonymity
great hidden trouble
great convenience
data privacy
Geohash coding
efficient location privacy preserving model
location based services
location-based services
query processing
Metrics
pubcrawl
mobile computing
biblio
Optimized Data de-Identification Using Multidimensional k-Anonymity
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
data quality
privacy models and measurement
privacy protection mechanism
privacy preserving
privacy leak risk
priority weight-adjusted method
personal privacy
personal information
optimized multidimensional method
multidimensional k-anonymity
mean difference recommending tree method
MDR tree method
k-anonymity
information loss rate
globalized knowledge economy
de-identification
Big Data
data authenticity preservation
big data analysis
anonymization-based de-identification method
information loss
greedy algorithms
Big Data Analytics
Numerical models
data privacy
Measurement
data analysis
Data protection
Metrics
privacy
pubcrawl
Data models
« first
‹ previous
1
2
3
next ›
last »